CVE-2024-5455
📋 TL;DR
This vulnerability in the Plus Addons for Elementor WordPress plugin allows authenticated attackers with Contributor-level access or higher to perform Local File Inclusion via the 'magazine_style' parameter. This enables execution of arbitrary PHP code on the server, potentially leading to data theft, access control bypass, or full system compromise. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- Plus Addons for Elementor Page Builder plugin for WordPress
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise leading to data exfiltration, ransomware deployment, or complete site takeover through arbitrary code execution.
Likely Case
Unauthorized file access, privilege escalation to administrator, and installation of backdoors or malware on the WordPress site.
If Mitigated
Limited impact if proper file permissions restrict PHP execution and web server runs with minimal privileges.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once attacker has Contributor privileges.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.5.5 or later
Vendor Advisory: https://roadmap.theplusaddons.com/updates/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Plus Addons for Elementor'. 4. Click 'Update Now' if available, or download version 5.5.5+ from WordPress repository. 5. Activate updated plugin.
🔧 Temporary Workarounds
Disable Dynamic Smart Showcase Widget
allTemporarily disable the vulnerable widget component
Restrict Contributor File Uploads
allLimit file upload capabilities for Contributor-level users
🧯 If You Can't Patch
- Immediately deactivate and remove the Plus Addons for Elementor plugin
- Implement strict file permission controls and disable PHP execution in upload directories
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'Plus Addons for Elementor' version 5.5.4 or lower
Check Version:
wp plugin list --name='Plus Addons for Elementor' --field=version
Verify Fix Applied:
Confirm plugin version is 5.5.5 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual file inclusion attempts in web server logs
- POST requests containing 'magazine_style' parameter with file paths
- PHP execution from non-standard locations
Network Indicators:
- HTTP requests to plugin files with suspicious parameter values
- Unexpected file uploads to media directories
SIEM Query:
web.url:*magazine_style* AND web.method:POST